{ "id": "1205.2807", "version": "v2", "published": "2012-05-12T18:48:15.000Z", "updated": "2015-01-29T18:35:53.000Z", "title": "Eavesdropping in Semiquantum Key Distribution Protocol", "authors": [ "Arpita Maitra", "Goutam Paul" ], "comment": "11 pages, 2 Figures", "journal": "Information Processing Letters, pages 418-422, vol. 113, issue 12, June 30, 2013", "doi": "10.1016/j.ipl.2013.03.008", "categories": [ "quant-ph", "cs.CR" ], "abstract": "In semiquantum key-distribution (Boyer et al.) Alice has the same capability as in BB84 protocol, but Bob can measure and prepare qubits only in $\\{|0\\rangle, |1\\rangle\\}$ basis and reflect any other qubit. We study an eavesdropping strategy on this scheme that listens to the channel in both the directions. With the same level of disturbance induced in the channel, Eve can extract more information using our two-way strategy than what can be obtained by the direct application of one-way eavesdropping in BB84.", "revisions": [ { "version": "v1", "updated": "2012-05-12T18:48:15.000Z", "title": "Eavesdropping in Semiquantum Key Distribution Protocol: Classical vs. Hadamard Bob", "abstract": "The quantum key distribution protocol with classical Bob, well known as semiquantum key distribution, has been proposed a few years back (Boyer et al., PRL 2007, PRA 2009). In this protocol Alice has the same capability as in the traditional BB84 protocol, but Bob is limited by the constraint that he can measure or prepare qubits only in $\\{|0>, |1>\\}$ basis and reflect any other qubit (or in other words, let it go undisturbed). In this scheme the qubits travel from Alice to Bob and then again from Bob to Alice. We study an eavesdropping strategy on this scheme that listens to the channel in both the directions. With the same level of disturbance induced in the channel, Eve can be extract more information using our two-way strategy than what can be obtained by the direct application of one-way eavesdropping in case of BB84 protocol. Towards resisting this eavesdropping strategy, we modify the semiquantum scheme by incorporating a Hadamard gate at Bob's end.", "comment": "7 pages, 2 Figures", "journal": null, "doi": null }, { "version": "v2", "updated": "2015-01-29T18:35:53.000Z" } ], "analyses": { "subjects": [ "81P94" ], "keywords": [ "distribution protocol", "hadamard bob", "semiquantum", "eavesdropping strategy", "traditional bb84 protocol" ], "tags": [ "journal article" ], "note": { "typesetting": "TeX", "pages": 11, "language": "en", "license": "arXiv", "status": "editable", "adsabs": "2012arXiv1205.2807M" } } }